SlideShare a Scribd company logo
How To Protect From Malware
Safe At Work And At Home
by Infonautics GmbH www.infonautics.ch
Virus
Virus
A computer virus is a malicious software program which can infect files,
software and data carriers. Once activated, the computer virus can make
modifications to hardware, operating system and software without your
knowledge.
Caution:
• of email attachments of any kind
• when installing software, especially from dubious sources
• when copying data from storage media (e.g., USB stick) of
unknown or unchecked sources
• when downloading files of dubious sources
Worm
Worm
In contrast to the computer virus, the computer worm spreads
independently. Its goal is to reproduce and spread as quickly as possible.
For example a computer worm is able to read address books and dispatch
bulk emails independently.
Caution:
• of email attachments of any kind
• of security vulnerabilities in the operating system, programs,
network and Internet connections
• when copying data from storage media (e.g., USB stick) of
unknown or unchecked sources
• when downloading files of dubious sources
Trojan
Trojan
Usually, a trojan comes as a pretended useful application, in order to carry
out unnoticed additional malicious functions and thus to transmit sensitive
data such as passwords, credit card numbers and e-banking information
etc. to cyber criminals.
Caution:
• of email attachments of any kind
• when installing software of unkown sources
• when downloading files of dubious sources
• when visiting questionable websites
• of broswer plugins
Scareware
Scareware
Scareware makes the user believe that there is a problem with the
computer and a supposedly useful software has immediately to be
downloaded and installed in order to solve the problem.
Caution:
• of sudden warning messages that appear on your desktop
or as pop-ups in the browser
• if you are prompted to download immediately a specific
software
Ransomware
Ransomware
Ransomware, also called blackmail Trojan, infects your computer with the
intention to encrypt most important data and release it only by your paying
a ransom.
Caution:
• of email attachments of any kind
• when using file-shareing sites
• when downloading files of dubious sources
• of links in Facebook messages
• when visiting questionable websites
Spyware
Spyware
Spyware, also called spy software, is used to track down people's identity
without their knowledge. In order to gain access to this data the spyware is
reading keyboard inputs and recording screen views.
Caution:
• with supposedly „free“ software
• when downloading files of dubious sources
• when visitiong questionable websites
Adware
Adware
As the name suggests (ad = advertising), adware is regularly displaying
unsolicited advertisements as pop-ups.
Caution:
• of email attachments of any kind
• when clicking on pop-up ads
• when downloading free software on questionable sites
• when visiting misleading / untrustworthy websites
Phishing
Phishing
The goal of phishing is the theft of sensitive data, such as bank account
login data and credit card numbers, e-mail accounts and social media
accounts based on fake emails, bogus websites or short messages.
Caution:
• if prompted to specify login data such as password and user
ID - Never execute!
• of inconsistent emails (false sender, wrong web address
(URL) - Do not react!
How To Protect Yourself From Malware
In principle, there are two important aspects to protect
against malware. On one hand, there is valuable and
important software available which can protect us
against "invaders" on our computers. On the other hand,
human beings themselves are a central factor. Our
behavior, what we do or do not, is a major contributor to
protecting us from malicious software.
How To Protect Yourself From Malware
• Anitvirus Software: An antivirus software on your computer is an
absolute prerequisite to protect yourself against viruses and worms.
• Firewall: The firewall is the "protective barrier" of unwanted access to
your computer via Internet.
• Install an Ad Blocker on your web browser.This protects against the
execution of unwanted scripts.
Technical Aspects
This software must be installed on your computer:
How To Protect Yourself From Malware
• Have a healthy scepticism about email attachements from unkown
sources. Never open email attachments from unknown sources.
• Be careful when clicking on links in email messages from unknown
senders. Signs of possible untrustworthy emails are: no reasonable
subject line and no verifiable content, or only attachments without mail
content.
• Download software from trusted sources only.
• Ignore urgent installation prompts on the Web.
• Never disclose personal information.
• If possible, do not log on to the system with administrator rights for
normal work.
• Update regularly the operating system and installed programs.
Personal Aspects
Consider the following for malware protection:
How To Protect Yourself From Malware
Distinguish between a complete system backup and backup of your
working files.
The system backup can be carried out once a week and after significant
changes.A 1: 1 image backup of the complete hard disk (including
programs and data) to an external data carrier is recommended.This also
protects from a possible technical failure of a hard disk.
The backup of the working files should take place daily , or better still,
should be automatically running in the background. As for example with
the backup software Live File Backup for Windows. Download here the
free trial version: www.livefilebackup.com
Data Backup
And last but not least, perform backups regularly:
Live File Backup For Windows
Automatically running data backup in
the background.
Download now free trial version!
www.livefilebackup.com
Imprint
Developed by INFONAUTICS GmbH
Eichholzweg 16
6312 Steinhausen
Schweiz
www.infonautics.ch
Author Anita Wirz
Picture Source Pixabay

More Related Content

What's hot

Malware
MalwareMalware
Malware
Tuhin_Das
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
spyware
spywarespyware
spyware
NamanKikani
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
Net at Work
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Spyware
SpywareSpyware
Spyware
 
Computer virus
 Computer virus Computer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
spyware
spywarespyware
spyware
 
MALWARE
MALWAREMALWARE
MALWARE
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 

Viewers also liked

Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Computer malware anti malware coevolution
Computer malware anti malware coevolution Computer malware anti malware coevolution
Computer malware anti malware coevolution
Himanshu Dubey
 
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
The HR Observer
 
Engagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case StudyEngagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case Study
The HR Observer
 
Death of appraisal - Webinar
Death of appraisal - WebinarDeath of appraisal - Webinar
Death of appraisal - Webinar
The HR Observer
 
Employing Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive EngagementEmploying Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive Engagement
The HR Observer
 
Erfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführenErfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführen
INFONAUTICS GmbH
 
Webinar: Defend Your Training Budget
Webinar: Defend Your Training BudgetWebinar: Defend Your Training Budget
Webinar: Defend Your Training Budget
The HR Observer
 
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Digiday
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
anthnyq
 
Malware
MalwareMalware
Malware
fovi96
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
jackadision
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware Sanyog Chandra
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
aaberra
 
Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!
INFONAUTICS GmbH
 
How hr can get a seat on the board
How hr can get a seat on the boardHow hr can get a seat on the board
How hr can get a seat on the board
The HR Observer
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
OPSWAT
 

Viewers also liked (20)

Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Computer malware anti malware coevolution
Computer malware anti malware coevolution Computer malware anti malware coevolution
Computer malware anti malware coevolution
 
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
 
Engagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case StudyEngagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case Study
 
Death of appraisal - Webinar
Death of appraisal - WebinarDeath of appraisal - Webinar
Death of appraisal - Webinar
 
Employing Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive EngagementEmploying Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive Engagement
 
Website images
Website imagesWebsite images
Website images
 
Erfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführenErfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführen
 
Webinar: Defend Your Training Budget
Webinar: Defend Your Training BudgetWebinar: Defend Your Training Budget
Webinar: Defend Your Training Budget
 
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Malware
MalwareMalware
Malware
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
 
Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!
 
How hr can get a seat on the board
How hr can get a seat on the boardHow hr can get a seat on the board
How hr can get a seat on the board
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 

Similar to How To Protect From Malware

Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Virus
VirusVirus
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
Bipulok
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
Frank Victory
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
Azri Abdin
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
Arnav Kumar
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Computer security
Computer securityComputer security
Computer security
Robin E. Beavers
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 

Similar to How To Protect From Malware (20)

anti_virus
anti_virusanti_virus
anti_virus
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Computer virus
Computer virusComputer virus
Computer virus
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus
VirusVirus
Virus
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Internet security
Internet securityInternet security
Internet security
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer security
Computer securityComputer security
Computer security
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Malicious
MaliciousMalicious
Malicious
 

Recently uploaded

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 

Recently uploaded (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 

How To Protect From Malware

  • 1. How To Protect From Malware Safe At Work And At Home by Infonautics GmbH www.infonautics.ch
  • 3. Virus A computer virus is a malicious software program which can infect files, software and data carriers. Once activated, the computer virus can make modifications to hardware, operating system and software without your knowledge. Caution: • of email attachments of any kind • when installing software, especially from dubious sources • when copying data from storage media (e.g., USB stick) of unknown or unchecked sources • when downloading files of dubious sources
  • 5. Worm In contrast to the computer virus, the computer worm spreads independently. Its goal is to reproduce and spread as quickly as possible. For example a computer worm is able to read address books and dispatch bulk emails independently. Caution: • of email attachments of any kind • of security vulnerabilities in the operating system, programs, network and Internet connections • when copying data from storage media (e.g., USB stick) of unknown or unchecked sources • when downloading files of dubious sources
  • 7. Trojan Usually, a trojan comes as a pretended useful application, in order to carry out unnoticed additional malicious functions and thus to transmit sensitive data such as passwords, credit card numbers and e-banking information etc. to cyber criminals. Caution: • of email attachments of any kind • when installing software of unkown sources • when downloading files of dubious sources • when visiting questionable websites • of broswer plugins
  • 9. Scareware Scareware makes the user believe that there is a problem with the computer and a supposedly useful software has immediately to be downloaded and installed in order to solve the problem. Caution: • of sudden warning messages that appear on your desktop or as pop-ups in the browser • if you are prompted to download immediately a specific software
  • 11. Ransomware Ransomware, also called blackmail Trojan, infects your computer with the intention to encrypt most important data and release it only by your paying a ransom. Caution: • of email attachments of any kind • when using file-shareing sites • when downloading files of dubious sources • of links in Facebook messages • when visiting questionable websites
  • 13. Spyware Spyware, also called spy software, is used to track down people's identity without their knowledge. In order to gain access to this data the spyware is reading keyboard inputs and recording screen views. Caution: • with supposedly „free“ software • when downloading files of dubious sources • when visitiong questionable websites
  • 15. Adware As the name suggests (ad = advertising), adware is regularly displaying unsolicited advertisements as pop-ups. Caution: • of email attachments of any kind • when clicking on pop-up ads • when downloading free software on questionable sites • when visiting misleading / untrustworthy websites
  • 17. Phishing The goal of phishing is the theft of sensitive data, such as bank account login data and credit card numbers, e-mail accounts and social media accounts based on fake emails, bogus websites or short messages. Caution: • if prompted to specify login data such as password and user ID - Never execute! • of inconsistent emails (false sender, wrong web address (URL) - Do not react!
  • 18. How To Protect Yourself From Malware In principle, there are two important aspects to protect against malware. On one hand, there is valuable and important software available which can protect us against "invaders" on our computers. On the other hand, human beings themselves are a central factor. Our behavior, what we do or do not, is a major contributor to protecting us from malicious software.
  • 19. How To Protect Yourself From Malware • Anitvirus Software: An antivirus software on your computer is an absolute prerequisite to protect yourself against viruses and worms. • Firewall: The firewall is the "protective barrier" of unwanted access to your computer via Internet. • Install an Ad Blocker on your web browser.This protects against the execution of unwanted scripts. Technical Aspects This software must be installed on your computer:
  • 20. How To Protect Yourself From Malware • Have a healthy scepticism about email attachements from unkown sources. Never open email attachments from unknown sources. • Be careful when clicking on links in email messages from unknown senders. Signs of possible untrustworthy emails are: no reasonable subject line and no verifiable content, or only attachments without mail content. • Download software from trusted sources only. • Ignore urgent installation prompts on the Web. • Never disclose personal information. • If possible, do not log on to the system with administrator rights for normal work. • Update regularly the operating system and installed programs. Personal Aspects Consider the following for malware protection:
  • 21. How To Protect Yourself From Malware Distinguish between a complete system backup and backup of your working files. The system backup can be carried out once a week and after significant changes.A 1: 1 image backup of the complete hard disk (including programs and data) to an external data carrier is recommended.This also protects from a possible technical failure of a hard disk. The backup of the working files should take place daily , or better still, should be automatically running in the background. As for example with the backup software Live File Backup for Windows. Download here the free trial version: www.livefilebackup.com Data Backup And last but not least, perform backups regularly:
  • 22. Live File Backup For Windows Automatically running data backup in the background. Download now free trial version! www.livefilebackup.com
  • 23. Imprint Developed by INFONAUTICS GmbH Eichholzweg 16 6312 Steinhausen Schweiz www.infonautics.ch Author Anita Wirz Picture Source Pixabay